Multi-phase target reconnaissance combining passive and active techniques for comprehensive attack surface mapping
From greyhatccnpx claudepluginhub overtimepog/greyhatcc --plugin greyhatccThis skill uses the workspace's default tool permissions.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
You are executing the greyhatcc reconnaissance skill. Perform a comprehensive multi-phase recon on the provided target.
/greyhatcc:recon <target> where target is a domain, IP, or URL.
{{ARGUMENTS}} is parsed automatically — just provide a target in any format:
No format specification needed from user — detect and proceed.
Before executing this skill:
.greyhatcc/scope.json — verify target is in scope, note exclusions.greyhatcc/hunt-state.json — check active phase, resume contextfindings_log.md, tested.json, gadgets.json — avoid duplicating workCT Log Enumeration: Query crt.sh for subdomains
Use WebFetch: https://crt.sh/?q=%25.<domain>&output=json
DNS Records: Use MCP tool greyhatcc_sec__dns_records for comprehensive DNS data
WHOIS: Use MCP tool greyhatcc_sec__whois_lookup for registration data
Shodan Intelligence: Use MCP tool greyhatcc_s__shodan_host_lookup or greyhatcc_s__shodan_search
Technology Fingerprinting: Use MCP tool greyhatcc_sec__header_analysis for HTTP headers
WAF Detection: Use MCP tool greyhatcc_sec__waf_detect to identify protections
Wayback Machine: Use WebFetch on https://web.archive.org/cdx/search/cdx?url=<domain>/*&output=text&fl=original&collapse=urlkey&limit=500
Port Scanning: Run nmap via Bash (optionally use run_in_background for long full scans)
nmap -Pn -sV --top-ports 1000 <target>nmap -Pn -sV -sC -p- <target> (optionally background — your choice)SSL/TLS Analysis: Use MCP tool greyhatcc_sec__ssl_analysis
Service Enumeration: Cross-reference detected services with Shodan data
Delegate to recon-specialist agent via Task tool for standard recon, or recon-specialist-high for complex targets.
Save all outputs to <target_dir>/recon/:
subdomains.txt - Discovered subdomainsdns_records.md - DNS datatech_stack.md - Technology fingerprintshodan_<ip>.md - Shodan intelligencerecon_summary.md - Executive summary with attack surface prioritiesParallel dispatch is optional. Use it when tasks are independent and speed matters. Sequential is the default.
| Agent | Task | Tier |
|---|---|---|
subdomain-worker | CT logs + subdomain enumeration | Haiku |
fingerprint-worker | Tech fingerprinting + header analysis | Haiku |
shodan-worker | Shodan host lookup + SSL cert search | Haiku |
cloud-worker | S3/GCS/Azure bucket enumeration, Firebase discovery | Haiku |
osint-worker | WAF/CDN detection + OSINT | Haiku |
| Agent | Task | Tier |
|---|---|---|
js-worker | Download and analyze all JS bundles — extract endpoints, secrets, source maps | Sonnet |
takeover-worker | Dangling CNAME/NS/MX subdomain takeover detection | Haiku |
portscan-worker | Port scanning with service detection | Haiku |
subdomain-takeover | BadDNS + dangling CNAME/NS/MX detection on all discovered subdomains | Sonnet |
network-analyst-low | Port scanning + service enumeration on discovered IPs | Haiku |
osint-researcher-high | Deep OSINT — employee enumeration, acquisition research, job posting analysis | Opus |
After all agents complete, aggregate results with recon-specialist (Sonnet):
attack_plan.md with prioritized targetsAfter recon completes:
/greyhatcc:js; if cloud assets found, suggest /greyhatcc:cloud; if dangling subdomains found, suggest /greyhatcc:takeoverAfter completing this skill:
tested.json — record what was tested (asset + vuln class)gadgets.json — add any informational findings with provides/requires tags for chainingfindings_log.md — log any confirmed findings with severity